CVE-2024-42280

In the Linux kernel, the following vulnerability has been resolved: mISDN: Fix a use after free in hfcmulti_tx() Don't dereference *sp after calling dev_kfree_skb(*sp).
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

10 Sep 2024, 18:43

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE CWE-416
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
First Time Linux linux Kernel
Linux
References () https://git.kernel.org/stable/c/4d8b642985ae24f4b3656438eb8489834a17bb80 - () https://git.kernel.org/stable/c/4d8b642985ae24f4b3656438eb8489834a17bb80 - Patch
References () https://git.kernel.org/stable/c/61ab751451f5ebd0b98e02276a44e23a10110402 - () https://git.kernel.org/stable/c/61ab751451f5ebd0b98e02276a44e23a10110402 - Patch
References () https://git.kernel.org/stable/c/70db2c84631f50e02e6b32b543700699dd395803 - () https://git.kernel.org/stable/c/70db2c84631f50e02e6b32b543700699dd395803 - Patch
References () https://git.kernel.org/stable/c/7e4a539bca7d8d20f2c5d93c18cce8ef77cd78e0 - () https://git.kernel.org/stable/c/7e4a539bca7d8d20f2c5d93c18cce8ef77cd78e0 - Patch
References () https://git.kernel.org/stable/c/8f4030277dfb9dbe04fd78566b19931097c9d629 - () https://git.kernel.org/stable/c/8f4030277dfb9dbe04fd78566b19931097c9d629 - Patch
References () https://git.kernel.org/stable/c/9460ac3dd1ae033bc2b021a458fb535a0c36ddb2 - () https://git.kernel.org/stable/c/9460ac3dd1ae033bc2b021a458fb535a0c36ddb2 - Patch
References () https://git.kernel.org/stable/c/d3e4d4a98c5629ccdcb762a0ff6c82ba9738a0c3 - () https://git.kernel.org/stable/c/d3e4d4a98c5629ccdcb762a0ff6c82ba9738a0c3 - Patch
References () https://git.kernel.org/stable/c/ddc79556641ee070d36be0de4a1f0a16a71f1fc7 - () https://git.kernel.org/stable/c/ddc79556641ee070d36be0de4a1f0a16a71f1fc7 - Patch

19 Aug 2024, 12:59

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mISDN: corrige un use after free en hfcmulti_tx() No elimine la referencia a *sp después de llamar a dev_kfree_skb(*sp).

19 Aug 2024, 05:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/70db2c84631f50e02e6b32b543700699dd395803 -
  • () https://git.kernel.org/stable/c/8f4030277dfb9dbe04fd78566b19931097c9d629 -
  • () https://git.kernel.org/stable/c/9460ac3dd1ae033bc2b021a458fb535a0c36ddb2 -
  • () https://git.kernel.org/stable/c/d3e4d4a98c5629ccdcb762a0ff6c82ba9738a0c3 -

17 Aug 2024, 09:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-08-17 09:15

Updated : 2024-09-10 18:43


NVD link : CVE-2024-42280

Mitre link : CVE-2024-42280

CVE.ORG link : CVE-2024-42280


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free